Articles Cracking the Code: Overcoming SHA-Based Authentication Barriers in 1-Wire DevicesUnveiling Vulnerabilities: Breaking Down SHA-1 and SHA-256 Authentication in Battery Fuel Gauges